• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptive output regulation for cyber-physical systems under time-delay attacks

    2022-03-02 06:46:10DanJinBoChenLiYuShichaoLiu
    Control Theory and Technology 2022年1期

    Dan Jin·Bo Chen·Li Yu·Shichao Liu

    Abstract In this paper,we present an output regulation method for unknown cyber-physical systems(CPSs)under time-delay attacks in both the sensor-to-controller(S-C)channel and the controller-to-actuator(C-A)channel.The proposed approach is designed using control inputs and tracking errors which are accessible data.Reinforcement learning is leveraged to update the control gains in real time using policy or value iterations.A thorough stability analysis is conducted and it is found that the proposed controller can sustain the convergence and asymptotic stability even when two channels are attacked. Finally, comparison results with a simulated CPS verify the effectiveness of the proposed output regulation method.

    Keywords Adaptive output regulation·Cyber-physical systems·Time-delay attacks·Reinforcement learning

    1 Introduction

    Cyber-physical systems(CPSs)integrate computation,communication and control to achieve the desired performance of physical processes[1].CPSs have been implemented in a wide range of applications such as industrial manufactures[2],smart grids[3],transportation networks[4],health and medicine[5].However,the integration of computation,communication and control in turn makes CPSs vulnerable to cyber attacks[6].In recent years,the number of CPS security incidents has increased rapidly[7],and some incidents have caused critical damages to the infrastructures such as Stuxnet in Iraq[8]and BlackEnergy in Ukraine.Therefore,it is vital to innovate the security of CPSs.

    Many security problems come from cyber attacks.Timedelay attacks [9–11], as one kind of cyber attacks, tamper with temporal characteristics of the communication channels and lead to signal delays in certain network nodes[12].Being different from DoS attacks, time-delay attacks are less costly and harder to be detected [13–15], due to the fact that time-delay attackers only need to occupy part of the channel without blocking the whole transmission. At the same time, time-delay attacks are easier to be implemented technically than deception attacks[16–18],as there is no need for time-delay attackers to capture and tamper the information. Furthermore, though time-delay attacks cause the transmitted information to be delayed, it is different fromnetwork-induceddelays.Thisisbecauseattack-induced delays are destructive and the instantaneous fluctuations of delays can be very large.If attack-induced delays cannot be handled well, they may affect the normal operation of the system seriously,especially for the CPSs with high real-time requirements. Therefore, it is crucial to address the timedelay attacks in CPSs.

    In the existing works,several approaches have been proposed to deal with delays in CPSs, including the random method[19,20],the robust method[21,22],and the switched system method[23,24].Though delays can be handled well with these methods, most of the works require the exact knowledge of the system model.Recently,model-free methods have been increasingly designed in the field of control[25–32]. Reinforcement learning (RL) [33], which learns the optimal behaviors by observing the responses from the environment to sub-optimal control policies [34], has a great advantage in solving model-free problems. Adaptive dynamic programming (ADP), as an important branch of RL[35],is an effective method in solving the optimal control problem.For example,the RL and ADP methods were adopted in[25–27]to solve the optimal control problems for unknown linear systems. In these work, they addressed the delays of one channel,constant delays of multi-channels,and time-varying delays of multi-channels, respectively. While measurements were used to learn the optimal controllers in these works, disturbance rejection was not considered.Securing the control issue of unknown CPSs with actuator attacks and unmatched perturbation was addressed in [35].Although a model-free ADP algorithm was designed, the neural networks were introduced to approximate the value function and the identification error was added in the process of designing. The robust resilient control problem of the nonlinear system under actuator attacks was addressed in[32]by ADP techniques,although the system was partially unknown.Furthermore,the ADP method was also applied to solve the attack scheduling problem [36], the fault-tolerant problem[37]or privacy protection problem[38].However,to the best knowledge of the authors,there are few work on securing unknown CPSs against time-delay attacks.

    Based on the aforementioned analysis, the adaptive output regulation problem for unknown CPSs under time-delay attacks in the S-C channel and the C-A channel is considered in this paper. A measurement feedback controller is designed only using control inputs and tracking errors.The model-free RL method is adopted to update the control gains online. Although the method of designing the controller is similar to the one in [25], the location of the delay is different, and attack-induced delays exist in two channels in our paper. Based on the measurement feedback controller,the closed-loop system could achieve both asymptotic tracking and disturbance rejection.The main contributions of this paper are summarized as follows.

    1) It is proved that the performance index with delays is still quadratic, and the regulation equations with delays are obtained, which can ensure the linear output regulation problem to be solvable.

    2)The measurement feedback controller can still realize the real-time closed-loop feedback control for the system,even though two channels suffer from time-delay attacks,and the tracking errors between the system outputs and the reference signals are asynchronous.

    The rest of this paper is organized as follows.The problem formulation is stated in Sect.2. In Sect. 3, a measurement feedback controller with unknown model knowledge is designed, and the convergence of algorithms together with tracking performance is analyzed.Finally,a simulation example and the conclusion are presented in Sects.4 and 5,respectively.

    Notations R denotes the set of all real numbers, Rndenotes then-dimensional Euclidean space, Rn×mdenotes the set of alln×mreal matrices.Iis the identity matrix.XTrepresents the transpose of the matrixX.X >(<)0 denotes a positive-definite (negative-definite) matrix,X≥(≤)0 denotes a non-negative definite(non-positive definite)matrix.σ(X)denotes the set of eigenvalues of the matrixX.vec(X)is a vectorization operator that stacks each column of the matrixXto a column vector.

    2 Problem formulation

    In this section,the model of the CPS under time-delay attacks is obtained,and the augmented error system with measurement data is established.Then,the optimal output regulation of the CPS is described.

    2.1 System model with attack-induced delays

    Consider the following discrete-time system with unknown parameters:

    whereE∈ Rq×qis an unknown Hurwitz matrix. This exosystem generates both the disturbanced(k)=Dr(k)and the reference signalw(k)=Fr(k)to the system.In fact,the exosystem is a description together with the disturbance and the reference signal,the specific origin of the system(1)and the exosystem(2)can be referred to the literature[39].In this paper,the reference signal is unknown and the tracking errore(k)∈R is the solely measurable output variable.Take the Internet of Vehicles as an example,the tracking errors can be measured by installing the sensors on the follower-cars,but the reference trajectory of the leader-car is unknown. Furthermore, according to the CPS structure shown in Fig. 1,when the system outputy(k)=Cx(k)and the control inputu(k)are sent to the controller and the actuator through communication networks,respectively,the S-C channel or C-A channel may suffer from the adversary time-delay attacks.The model of the time-delay attack can be described as

    whered1,k≥0 andd2,k≥0 are the attack-induced delays in the C-A channel and S-C channel,respectively.Due to the constraint of attacks’cost,the dwell time of attacks is finite,hence the attack-induced delays are assumed to be bounded reasonably,i.e.,

    Assumption 1 The delays induced by time-delay attacks are bounded.

    From Assumption 1,we have 0 ≤d1,k≤d1and 0 ≤d2,k≤d2,whered1andd2are the maximal attack-induced delays in the C-A channel and S-C channel,respectively.It should be mentioned that the reference signal can be transmitted through the network or not in practice. Here, the security issue is mainly addressed that the attack is launched in the feedback or forward channel of the system,and the system output tracks a given reference signal,i.e.,the attack to the reference signal is not considered.For uncertain delays,the robust method is adopted in this paper, and the bounds of attack-induced delays are utilized to design the controller,more details are explained in Remark 1.Basing on the bounds of the attack-induced delays, the model of the system (1)under attacks can be described as follows:

    Next, the measurement data will be used to reconstruct the system model under time-delay attacks.

    2.2 Augmented error system with measurement data

    Due to the unmeasurable system state, the controller cannot be designed using the state feedback directly. Thus, an indirect way is to utilize the measurement information and designameasurementfeedbackcontrollerbyestablishingthe relation between the system state and the measurement information. In addition, let us defineξ(k)= [xT(k),rT(k)]T,then it follows from (2) and (4) that the augmented error system is written as

    whereM1x∈Rn×nz,M1r∈Rq×nz,nz=2(n+q)+d1+d2.It follows from the above derivation thatξ(k+d1)traces back to the state ofξ(k-n-q-d2).Actually,the historical timek-n-q-d2can be extended to a general time pointk-N,as long asNis bigger thann+q+d2. From the similar derivation ofξ(k+d1)thatξ(k+d1-d2)has the following form:

    Fig.1 The frame of CPSs under attacks

    2.3 Linear output regulator

    For the linear output regulator problem,the control input can be expressed as the standard formu(k)=-K x(k)+(K X+U)r(k)[40],whereKis obtained by solving an algebraic riccati equation(ARE),whileXandUare obtained by solving regulator equations.Inspired by the standard form of the controller,the following measurement feedback controller will be designed in this paper:

    whereKsatisfies thatA-BKis a Schur matrix,X∈Rn×qandU∈Rm×qare obtained by solving the following regulator equations:

    SinceA-BKis a Schur matrix,one has limk→∞ˉx(k)=0,then,limk→∞ˉu(k)=0,limk→∞e(k)=0 by(13)and(14).From the above analysis, the linear output regulation problem can be solved by applying the measurement feedback controller(12).At the same time,the open-loop form of the system(14)can be expressed as

    How to find the optimal controller (12) for the system under time-delay attacks in both channels will be solved in this paper. Here, the optimality is achieved by minimizing a predefined performance index or value function,which is chosen as

    Remark 1The measurement feedback controller in this paper is designed according to the bounds of delaysd1andd2,which relate to the dimension of the controller gain. The designed controller is applied to the system where the attackinduced delays are less than the bounds, it means that the control components are redundant. In practice, this control scheme can be achieved through the time stamp at each data segment and a trigger which is introduced artificially in the control/actuator center.Take the S-C channel as an example,when the control center receives the data packet with time informationkat timek+d2,k(d2,k≤d2), the artificial trigger in the control center will not be trigged at once untilk+d2,and the data packet with time informationkwill be adopted atk+d2.If there are still other data packets arrived before the timek+d2,those packets will wait in the buffer.In this case,the proposed method can still deal with the case of time-varying delays.

    Remark 2In practice, it is usually hard to obtain an exact system model, making it much difficult to design a secure controller. Fortunately, RL, which learns what to do from the environment so as to maximize a numerical reward signal [33], is a very effective tool to develop a model-free approach to update the control policy (action) and the performance index (reward). Based on the control inputs and tracking errors, the RL method is developed to update the controller gain in this paper.

    3 Measurement feedback design with unknown model knowledge

    Inthissection,ameasurementfeedbackcontrollerisdesigned to solve the problem(17)with unknown system parametersA,B,C,D,unknown exosystem parametersE,F,unmeasurable system statex(k),exosystem stater(k),and only the control inputs and tracking errors are utilized.

    3.1 Controller design

    Before presenting the algorithms, the following Lemma on the value function is introduced.

    Lemma 1For the infinite-horizon output regulation problem,the reference signal is produced by the exosystem (2), then the value function(16)under any fixed stabilizing controller(13)can be expressed as

    whereK j+1=(R+BTPj B)-1BTPj Ais obtained iteratively by solving the optimization problem (17) with no time-delays, i.e.,d1=d2= 0, then the system (15) is reduced to

    Remark 3Notice that the ARE(30)is nonlinear,and much expensive computation is required to obtainP*. To reduce the computational cost, the policy iteration (PI) algorithm and the value iteration(VI)algorithm,which are two iterative algorithms in RL,are usually employed to approachP*approximately. When the time goes to infinity,PjandK jwill achieve toP*andK*with small neighborhoods,respectively. In this case,u*(k)=(-K*M1ˉx+U M1r)Z(k)=- ?K*Z(k), and it is equivalent to ˉu*(k-d1)= -K*ˉx(k).This implies that the measurement feedback controller can stabilize the system(15)in an optimal sense.

    Next,the measurement data will be used to learn the controller gain ?K*.Let

    Then,the online PI algorithm via the measurement feedback can be summarized by Algorithm1.

    images/BZ_27_915_802_950_838.png

    Note that the initial control policy needs to be admissible in the PI algorithm.To avoid the restriction,the VI algorithm is derived later.First,it is derived from(22)that

    whereΘ= [θT(k0-d1),...,θT(k0+s-d1)]T,Φj=[(φj(k0))T,...,(φj(k0+s))T]T. Then, the controller gain can be updated by

    Then,the online VI algorithm via the measurement feedback can be summarized by Algorithm2. The main differences between Algorithm 1 and Algorithm 2 are the requirement of the initial control policy and the convergence rate of the algorithm. If the initial control policy is admissible, Algorithm 1 can be chosen and its convergence rate is faster relatively than that of Algorithm 2.If the initial control policy is arbitrary, Algorithm 2 can be chosen, but the convergence rate of Algorithm2 will be slower relatively.

    Remark 4It is known from (26) and (35) that ?P∈R[2(n+q)+d1+d2+1]×[2(n+q)+d1+d2+1] is a symmetric matrix.To guarantee the application of the least square method,more than [2(n+q)+d1+d2+1]2/2 sample data should be collected before the learning process in Algorithm1 or Algorithm2.

    Remark 5As usual, a probing noise is added into the input in the process of collecting data,the purpose is that the system can be excited sufficiently and the data can be collected diversely. Furthermore, the rank condition of matricesΨ jandΘcan be satisfied easily. Notice that this condition is necessary when ?Pjis solved uniquely from(33)and(37)at each iteration.

    images/BZ_27_1852_1786_1888_1823.png

    3.2 Convergence and tracking performance analysis

    In this subsection,a rigorous proof is presented for the convergence of above algorithms,and the tracking performance is analyzed after an approximate optimal controller is applied to the system.

    Theorem 1The sequence{ ?Pj}and{ ?K j}obtained by Algorithm1 or Algorithm2 will converge to?P*and?K*as j→∞,where

    ProofFirst,consider the convergence of Algorithm1.The PI algorithm for solving the discrete-time ARE (30) had been presented in some literature such as [25–27], and the convergence was presented in[41].Particularly,Pjwas solved from

    Based on the convergent Algorithms, the next theorem illustrates that the approximate optimal controller obtained by Algorithm1 or Algorithm2 can make the system achieve asymptotic tracking,even in the case of external disturbance and time-delay attacks.

    Theorem 2The measurement feedback control policy u(kd1)= - ?K j*Z(k-d1) can stabilize the system (15) and guaranteelimk→∞e(k)=0.

    Since the sequence{K j}is convergent and the optimal controller gainK*can stabilize the system, i.e.,A-BK*is Schur. It implies that there is a small constant∈>0, and the neighborhood withK*as the centerδ∈(K*),then given any approximate optimal controller gainK j*∈δ∈(K*),it is satisfied thatA-BK j*is Schur.Hence,limk→∞ˉx(k)=0,which implies limk→∞e(k)=0.■

    Remark 6In Algorithm1 and Algorithm2,the initial control policies are used to generate system trajectories during the period of collecting data.In the period of learning,the estimation policyuj(k)= - ?K j Z(k)is updated by the collected data until certain precision of iterations is arrived. Hence,Algorithms1 and Algorithm2 are off-policy learning methods.

    Remark 7For any attack-induced delays, the measurement feedback controller can be obtained by the proposed algorithms so long as that enough historical data is collected and the correlated conditions are satisfied.In most practical systems,the delay in the system cannot be too large due to the constraint of attack cost. When the delay exceeds certain threshold,the information is usually discarded,and this case can be regarded as DoS attacks, which will be one of our future works.

    4 Simulation examples

    In this section, the mass–spring–damper system (Fig.2) in[43,44]is used to validate the effectiveness of the proposed algorithms. In Fig.2,M,Landcrepresent the mass of the object,the stiffness constant of the spring and the damping,respectively.Then,thedynamicsprocessofthemass–spring–damper system is modeled by

    Fig.2 Mass–spring–damper system

    The performance index is chosen as (16) withR= 1 andQ=100.The effectiveness of the proposed algorithms will be validated when time-delay attacks occur in different channels.

    A.The case of time-delay attacks in the S-C channel

    The time-delay attacks occur in the S-C channel,and there are attack-induced delays in the output.The initial stabilizing controller gain is chosen as

    Afterk= 80, ?K25is applied to the system,the trajectories of the system output and the reference are depicted in Fig.3.It is shown that the output tracks the reference signal asymptotically, which accords with the theoretical results in this paper.

    Fig.3 Case of time-delay attacks in the S-C channel

    Fig.4 Case of time-delay attacks in the C-A channel

    B.The case of time-delay attacks in the C-A channel

    If time-delay attacks occur in the C-A channel,there will be attack-induced delays in the input.Algorithm2 is implemented,and the initial controller gain is chosen arbitrarily as follows:

    C.Performance comparison

    Fig.5 Exploration noise

    Fig. 6 Case of time-delay attacks in two channels with compared method

    It is seen from the above simulations that the designed controller can achieve the adaptive output regulation in the presence of time-delay attacks. In fact, the case A in this paper was studied in [25], where the delay in one channel was addressed. The attack-induced delays in two channels are studied in this paper,and the maximum delays in different channels may not be the same.If the method of dealing with one-channel delay is applied to the system where twochannels suffer from adversary attacks, the system may be unstable,even be crashed.It is known that the dimensions of the designed controllers are different when the system with two-channel delays or one-channel delays.In the simulation,this fact has been illustrated by Fig.6. Before updating the controller,the relative data are collected along the system trajectory.When the learned measurement feedback controller is applied to the system without considering the delay in the S-C channel,the system trajectory will be far away from the reference signal.Hence,the learned controller with the case of input delay cannot stabilize the system with two-channel delays.

    When the C-A channel and the S-C channel both suffer from time-delay attacks unfortunately,the measurement feedback controller in this paper will be employed,and Algorithm2 will be used to test the system performance.Choose an arbitrary initial controller gain as follows:

    Fig.7 Case of time-delay attacks in two channels with our method

    Then,the approximate optimal controller gain is learned after 40 iterations

    Afterk= 120, ?K40is applied to the system, Fig.7 shows the trajectories of the system output and the reference signal.Compared with Fig.6,it is clear that the trajectory changes dramatically after updating the controller.Fig.7 shows that the approximate optimal control policy can stabilize the system and make the system output track the reference signal asymptotically,which is as expected for the designed control method in this paper.

    5 Conclusions

    This paper studied the adaptive output problem for unknown CPSs under time-delay attacks which occur in the S-C channel and the C-A channel.Historical control inputs and tracking errors were used to design the measurement feedback controller, which could ensure the system to achieve the real-time closed-loop feedback control, even though the current measurements could be delayed due to timedelay attacks.The measurement feedback controller gain was calculated and updated online through solving the ARE iteratively with the RL method, and the system could achieve the asymptotic tracking and disturbance rejection. Simulation results on a mass–spring–damper system demonstrated the effectiveness of the proposed method.In the future,the proposed method can be extended to the cooperative output regulation with set-point attacks,secure control with attack detection.

    Acknowledgements This work was supported by the National Natural Science Foundation of China(Nos.61973277, 62073292) and in part by the Zhejiang Provincial Natural Science Foundation of China(No.LR20F030004).

    中文字幕人成人乱码亚洲影| 在线十欧美十亚洲十日本专区| www国产在线视频色| 国产亚洲欧美在线一区二区| 欧美午夜高清在线| 午夜福利在线在线| 亚洲精品一区av在线观看| 亚洲美女黄片视频| 亚洲美女黄片视频| 男女做爰动态图高潮gif福利片| 91麻豆精品激情在线观看国产| 一二三四社区在线视频社区8| 90打野战视频偷拍视频| 一个人观看的视频www高清免费观看| 18禁裸乳无遮挡免费网站照片| 欧美极品一区二区三区四区| 亚洲色图av天堂| 亚洲精品日韩av片在线观看 | 国产真实乱freesex| 国产高清三级在线| 人妻夜夜爽99麻豆av| 日本精品一区二区三区蜜桃| 99精品久久久久人妻精品| 国产精品一区二区免费欧美| 国产极品精品免费视频能看的| 高清日韩中文字幕在线| 午夜福利视频1000在线观看| 久久久精品大字幕| av在线蜜桃| 日本精品一区二区三区蜜桃| bbb黄色大片| 国产伦精品一区二区三区四那| 悠悠久久av| 一二三四社区在线视频社区8| 午夜精品在线福利| 美女被艹到高潮喷水动态| 99久久久亚洲精品蜜臀av| 亚洲av免费在线观看| 嫁个100分男人电影在线观看| 久久久久精品国产欧美久久久| 免费av不卡在线播放| 亚洲美女视频黄频| 国产亚洲av嫩草精品影院| 精品人妻一区二区三区麻豆 | 90打野战视频偷拍视频| 性欧美人与动物交配| netflix在线观看网站| 嫩草影视91久久| 久久精品综合一区二区三区| 女人被狂操c到高潮| 久久久久免费精品人妻一区二区| 亚洲国产精品999在线| 欧美日韩精品网址| 他把我摸到了高潮在线观看| 久久性视频一级片| 午夜视频国产福利| 日韩成人在线观看一区二区三区| 欧美在线一区亚洲| xxx96com| 国产乱人视频| 一夜夜www| 99久国产av精品| 国内精品一区二区在线观看| 午夜免费观看网址| 在线观看免费午夜福利视频| 欧美乱码精品一区二区三区| 一a级毛片在线观看| 最近最新中文字幕大全免费视频| 校园春色视频在线观看| 又黄又粗又硬又大视频| 在线观看一区二区三区| 美女cb高潮喷水在线观看| 亚洲在线观看片| 亚洲成人久久性| 国产成人福利小说| 欧美3d第一页| 白带黄色成豆腐渣| 波多野结衣高清作品| 久9热在线精品视频| 国产精品电影一区二区三区| 人人妻人人澡欧美一区二区| 狠狠狠狠99中文字幕| 精品99又大又爽又粗少妇毛片 | 久久精品国产综合久久久| 午夜福利在线在线| 国产精品久久久久久人妻精品电影| 熟女少妇亚洲综合色aaa.| 免费无遮挡裸体视频| 久久精品国产亚洲av香蕉五月| 亚洲精华国产精华精| 久久久久精品国产欧美久久久| 中文亚洲av片在线观看爽| 欧美黑人欧美精品刺激| 国内精品久久久久久久电影| 亚洲最大成人中文| 国产精品,欧美在线| 国产亚洲精品久久久com| 高潮久久久久久久久久久不卡| 国产免费一级a男人的天堂| 变态另类丝袜制服| 国产97色在线日韩免费| 亚洲va日本ⅴa欧美va伊人久久| 少妇人妻一区二区三区视频| 99久久无色码亚洲精品果冻| 天堂网av新在线| 精品电影一区二区在线| 91在线精品国自产拍蜜月 | 亚洲熟妇中文字幕五十中出| 午夜激情欧美在线| 老熟妇乱子伦视频在线观看| 哪里可以看免费的av片| 黄色片一级片一级黄色片| 欧美日本视频| 国产伦精品一区二区三区视频9 | 久久国产精品影院| 国产一区二区亚洲精品在线观看| 亚洲精品456在线播放app | 搞女人的毛片| 男女做爰动态图高潮gif福利片| 黄片大片在线免费观看| 91在线观看av| 国产蜜桃级精品一区二区三区| 美女cb高潮喷水在线观看| 国产av麻豆久久久久久久| 国产男靠女视频免费网站| 欧美激情在线99| 中文字幕人妻熟人妻熟丝袜美 | 国产单亲对白刺激| 三级男女做爰猛烈吃奶摸视频| 欧美黄色片欧美黄色片| 久久久久性生活片| av福利片在线观看| 九色成人免费人妻av| 桃色一区二区三区在线观看| 精品福利观看| 亚洲内射少妇av| 国产视频内射| 亚洲 欧美 日韩 在线 免费| 超碰av人人做人人爽久久 | 亚洲成人精品中文字幕电影| 免费看十八禁软件| 日韩欧美在线乱码| 18禁国产床啪视频网站| 99久久精品国产亚洲精品| 久久久久国产精品人妻aⅴ院| 免费av毛片视频| 亚洲欧美日韩高清专用| 国产成+人综合+亚洲专区| 九九久久精品国产亚洲av麻豆| 久久九九热精品免费| 麻豆一二三区av精品| 无遮挡黄片免费观看| 日韩av在线大香蕉| 国产伦精品一区二区三区四那| 成人三级黄色视频| 男人和女人高潮做爰伦理| 亚洲成av人片在线播放无| 搡老岳熟女国产| 日韩高清综合在线| 国产精品99久久久久久久久| 国产精品一区二区三区四区久久| 日本撒尿小便嘘嘘汇集6| 亚洲色图av天堂| 亚洲精品美女久久久久99蜜臀| 国产中年淑女户外野战色| 在线十欧美十亚洲十日本专区| 国产精品,欧美在线| 热99re8久久精品国产| 欧美日韩瑟瑟在线播放| 久久久久久国产a免费观看| 狂野欧美激情性xxxx| 国产老妇女一区| 麻豆国产97在线/欧美| 成人鲁丝片一二三区免费| 麻豆成人av在线观看| 有码 亚洲区| 欧美色欧美亚洲另类二区| 波野结衣二区三区在线 | 男女那种视频在线观看| 国产精品久久久久久亚洲av鲁大| 久久精品91无色码中文字幕| 国产激情偷乱视频一区二区| 久久99热这里只有精品18| 99在线视频只有这里精品首页| 国产伦一二天堂av在线观看| 老汉色av国产亚洲站长工具| 亚洲久久久久久中文字幕| 不卡一级毛片| 香蕉丝袜av| 国产综合懂色| 亚洲成人中文字幕在线播放| 一级作爱视频免费观看| 一级黄色大片毛片| 久久精品国产99精品国产亚洲性色| 小说图片视频综合网站| 性色av乱码一区二区三区2| 两个人看的免费小视频| 3wmmmm亚洲av在线观看| 国内精品久久久久久久电影| h日本视频在线播放| 亚洲国产欧洲综合997久久,| 亚洲国产精品久久男人天堂| 婷婷精品国产亚洲av在线| 欧美成人a在线观看| 窝窝影院91人妻| 欧美bdsm另类| 老司机午夜十八禁免费视频| av在线蜜桃| 两个人视频免费观看高清| 亚洲欧美日韩高清在线视频| 久久人人精品亚洲av| 性色avwww在线观看| 国产亚洲精品综合一区在线观看| 一区福利在线观看| 国内精品久久久久久久电影| 亚洲中文字幕一区二区三区有码在线看| 在线观看美女被高潮喷水网站 | 欧美乱码精品一区二区三区| 天堂√8在线中文| 国产精品久久久久久久久免 | 亚洲国产精品999在线| 亚洲av免费高清在线观看| 国产精品亚洲美女久久久| 亚洲av免费在线观看| 狂野欧美激情性xxxx| 免费在线观看影片大全网站| 俺也久久电影网| 欧美乱码精品一区二区三区| 国产三级黄色录像| 真实男女啪啪啪动态图| 色噜噜av男人的天堂激情| 成人av在线播放网站| 白带黄色成豆腐渣| 男女之事视频高清在线观看| 看黄色毛片网站| 精品国产美女av久久久久小说| 国产亚洲欧美98| 欧美日韩黄片免| 亚洲av第一区精品v没综合| 高潮久久久久久久久久久不卡| 国产真人三级小视频在线观看| 操出白浆在线播放| 日本黄大片高清| 99国产精品一区二区蜜桃av| 一本综合久久免费| 露出奶头的视频| 日韩欧美国产在线观看| 午夜a级毛片| 老司机午夜十八禁免费视频| 午夜福利在线观看免费完整高清在 | 欧美在线一区亚洲| 无限看片的www在线观看| АⅤ资源中文在线天堂| 欧美大码av| 18禁黄网站禁片免费观看直播| 欧美日韩福利视频一区二区| 精品一区二区三区视频在线观看免费| 亚洲欧美日韩卡通动漫| 成人永久免费在线观看视频| 天堂√8在线中文| 国产精品 欧美亚洲| 国产三级在线视频| 在线免费观看不下载黄p国产 | 欧美不卡视频在线免费观看| 少妇裸体淫交视频免费看高清| 人妻丰满熟妇av一区二区三区| 午夜a级毛片| 色视频www国产| av在线蜜桃| 免费看十八禁软件| 亚洲欧美日韩东京热| 亚洲精品国产精品久久久不卡| av黄色大香蕉| 九九久久精品国产亚洲av麻豆| 成人鲁丝片一二三区免费| 午夜福利高清视频| 1024手机看黄色片| 亚洲一区二区三区色噜噜| 亚洲精品影视一区二区三区av| 国产精品99久久久久久久久| 偷拍熟女少妇极品色| 中文字幕久久专区| 日本精品一区二区三区蜜桃| 亚洲人成网站高清观看| 久久中文看片网| 欧洲精品卡2卡3卡4卡5卡区| 亚洲自拍偷在线| 午夜福利视频1000在线观看| 免费av观看视频| 精品电影一区二区在线| 免费在线观看影片大全网站| 亚洲精品美女久久久久99蜜臀| 国内精品久久久久久久电影| 国产熟女xx| 午夜福利欧美成人| www.www免费av| 免费在线观看日本一区| 女人高潮潮喷娇喘18禁视频| 久久6这里有精品| 国产高清三级在线| 国产精品影院久久| 亚洲国产精品成人综合色| 国产又黄又爽又无遮挡在线| 国产爱豆传媒在线观看| 少妇裸体淫交视频免费看高清| 黄色丝袜av网址大全| ponron亚洲| 国产高清有码在线观看视频| 高清在线国产一区| 精品电影一区二区在线| а√天堂www在线а√下载| 久久人妻av系列| 少妇丰满av| 国产成人欧美在线观看| 亚洲精品一区av在线观看| 狂野欧美白嫩少妇大欣赏| 人妻夜夜爽99麻豆av| 日本一二三区视频观看| 999久久久精品免费观看国产| 日本 欧美在线| 久久久久国产精品人妻aⅴ院| 少妇裸体淫交视频免费看高清| 99久久99久久久精品蜜桃| 亚洲国产欧美人成| 亚洲在线自拍视频| www.999成人在线观看| 国产高清videossex| av欧美777| 99久国产av精品| 日韩欧美精品v在线| 非洲黑人性xxxx精品又粗又长| 国产高清视频在线播放一区| av女优亚洲男人天堂| 久久精品91蜜桃| 18美女黄网站色大片免费观看| 亚洲欧美日韩东京热| 日本免费a在线| 9191精品国产免费久久| 免费看美女性在线毛片视频| 内射极品少妇av片p| 香蕉丝袜av| 亚洲无线观看免费| 免费看美女性在线毛片视频| 伊人久久精品亚洲午夜| 69人妻影院| 成人永久免费在线观看视频| 精品免费久久久久久久清纯| 久久久久国产精品人妻aⅴ院| 成人特级av手机在线观看| 欧美国产日韩亚洲一区| 最新在线观看一区二区三区| 国产激情欧美一区二区| 男女午夜视频在线观看| 91久久精品国产一区二区成人 | 日本撒尿小便嘘嘘汇集6| 久久国产精品影院| 久久久精品欧美日韩精品| 99久久成人亚洲精品观看| 97碰自拍视频| 在线观看午夜福利视频| 日韩欧美在线乱码| 色吧在线观看| 色视频www国产| 亚洲精品在线美女| 亚洲七黄色美女视频| 亚洲在线自拍视频| 色噜噜av男人的天堂激情| 国产美女午夜福利| 波野结衣二区三区在线 | 桃色一区二区三区在线观看| 日本成人三级电影网站| 中国美女看黄片| av福利片在线观看| 禁无遮挡网站| 每晚都被弄得嗷嗷叫到高潮| bbb黄色大片| 亚洲 国产 在线| 三级毛片av免费| 又粗又爽又猛毛片免费看| 黄色片一级片一级黄色片| 国产三级中文精品| 99久久精品国产亚洲精品| 欧美日本亚洲视频在线播放| 欧美一级毛片孕妇| 国产伦精品一区二区三区视频9 | 国产高清激情床上av| 色尼玛亚洲综合影院| 久久久成人免费电影| 欧美国产日韩亚洲一区| 深夜精品福利| 亚洲av中文字字幕乱码综合| 舔av片在线| 亚洲一区二区三区不卡视频| 久久久久久久精品吃奶| 精品不卡国产一区二区三区| 国产亚洲av嫩草精品影院| 麻豆久久精品国产亚洲av| 别揉我奶头~嗯~啊~动态视频| 悠悠久久av| 女警被强在线播放| 亚洲精品一区av在线观看| 女人被狂操c到高潮| 啦啦啦免费观看视频1| 成人亚洲精品av一区二区| 婷婷六月久久综合丁香| 国产成人a区在线观看| 免费高清视频大片| 亚洲午夜理论影院| 狠狠狠狠99中文字幕| 国语自产精品视频在线第100页| 色精品久久人妻99蜜桃| 在线天堂最新版资源| 精品欧美国产一区二区三| 两个人的视频大全免费| 免费在线观看成人毛片| 国产成人系列免费观看| 在线播放国产精品三级| 老汉色av国产亚洲站长工具| 欧美日本视频| 亚洲黑人精品在线| 999久久久精品免费观看国产| 亚洲人成电影免费在线| 亚洲成人精品中文字幕电影| svipshipincom国产片| 国产精品免费一区二区三区在线| 国产精品电影一区二区三区| 18禁在线播放成人免费| h日本视频在线播放| 黄片大片在线免费观看| 大型黄色视频在线免费观看| 又爽又黄无遮挡网站| 国内揄拍国产精品人妻在线| 淫妇啪啪啪对白视频| 亚洲精品国产精品久久久不卡| 在线播放无遮挡| 最近最新中文字幕大全免费视频| 午夜两性在线视频| 在线观看免费午夜福利视频| 欧美av亚洲av综合av国产av| 在线播放国产精品三级| 国产黄a三级三级三级人| 欧美日本视频| 男女视频在线观看网站免费| 日本黄大片高清| 非洲黑人性xxxx精品又粗又长| 国产成人系列免费观看| 亚洲天堂国产精品一区在线| 国产一区二区亚洲精品在线观看| 亚洲va日本ⅴa欧美va伊人久久| 午夜福利在线观看吧| 国产99白浆流出| 无人区码免费观看不卡| 啦啦啦免费观看视频1| 精品久久久久久久久久久久久| www.999成人在线观看| 在线国产一区二区在线| 免费人成视频x8x8入口观看| 动漫黄色视频在线观看| 中国美女看黄片| 九九在线视频观看精品| 51国产日韩欧美| 精华霜和精华液先用哪个| 国产av一区在线观看免费| 十八禁网站免费在线| 亚洲成av人片在线播放无| 69av精品久久久久久| 久久精品91蜜桃| 99热6这里只有精品| 国产一区二区在线观看日韩 | 国产主播在线观看一区二区| 啦啦啦观看免费观看视频高清| 乱人视频在线观看| 亚洲专区国产一区二区| 可以在线观看的亚洲视频| 久久国产乱子伦精品免费另类| 亚洲男人的天堂狠狠| 国产高清视频在线观看网站| 成人永久免费在线观看视频| a在线观看视频网站| 亚洲专区中文字幕在线| 一卡2卡三卡四卡精品乱码亚洲| 高清日韩中文字幕在线| 亚洲国产欧美网| 亚洲国产精品成人综合色| 日本黄大片高清| e午夜精品久久久久久久| 国产精品av视频在线免费观看| 99热这里只有是精品50| 久久久久久久午夜电影| 成人国产综合亚洲| 一级作爱视频免费观看| 国产一区在线观看成人免费| 国内精品久久久久精免费| 最近视频中文字幕2019在线8| 国产黄片美女视频| 99精品久久久久人妻精品| 97人妻精品一区二区三区麻豆| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 亚洲性夜色夜夜综合| 亚洲av五月六月丁香网| 精品熟女少妇八av免费久了| 日韩 欧美 亚洲 中文字幕| 日本一本二区三区精品| 国内毛片毛片毛片毛片毛片| 全区人妻精品视频| 成年免费大片在线观看| 国产精品免费一区二区三区在线| 亚洲无线观看免费| 男人的好看免费观看在线视频| 神马国产精品三级电影在线观看| 国产久久久一区二区三区| 久久精品影院6| 伊人久久精品亚洲午夜| 男人和女人高潮做爰伦理| 午夜福利18| 级片在线观看| 极品教师在线免费播放| 国产老妇女一区| 在线看三级毛片| 99久久精品热视频| 国产亚洲精品综合一区在线观看| 中国美女看黄片| 国产精品久久久久久亚洲av鲁大| 高清在线国产一区| 舔av片在线| 在线观看免费视频日本深夜| 99热6这里只有精品| 国产免费av片在线观看野外av| av专区在线播放| 天美传媒精品一区二区| 国产一区二区三区视频了| 亚洲精品456在线播放app | 色综合亚洲欧美另类图片| 看片在线看免费视频| 老鸭窝网址在线观看| 国内少妇人妻偷人精品xxx网站| 婷婷丁香在线五月| 麻豆国产97在线/欧美| 老熟妇乱子伦视频在线观看| 18禁黄网站禁片午夜丰满| 国产精品av视频在线免费观看| 成人精品一区二区免费| 一边摸一边抽搐一进一小说| 欧美日本亚洲视频在线播放| 国产精品一区二区免费欧美| 18禁美女被吸乳视频| 1000部很黄的大片| 亚洲国产中文字幕在线视频| 欧美日韩中文字幕国产精品一区二区三区| 国产精品1区2区在线观看.| 一级黄片播放器| 国产精品一及| 欧美绝顶高潮抽搐喷水| 亚洲国产色片| 久久这里只有精品中国| 一区二区三区国产精品乱码| 国产伦人伦偷精品视频| 免费无遮挡裸体视频| 18禁裸乳无遮挡免费网站照片| 日本黄大片高清| 国产欧美日韩一区二区精品| 悠悠久久av| 午夜激情欧美在线| 亚洲美女黄片视频| 国产精品久久久久久久久免 | 久久久久久久精品吃奶| 变态另类成人亚洲欧美熟女| 久久性视频一级片| 中文字幕av成人在线电影| 日本黄色片子视频| www日本黄色视频网| 精品人妻一区二区三区麻豆 | 一个人免费在线观看的高清视频| 欧美+日韩+精品| 亚洲精华国产精华精| 国产一区二区三区视频了| 美女 人体艺术 gogo| 91av网一区二区| 国产av一区在线观看免费| 亚洲国产欧洲综合997久久,| 亚洲无线观看免费| 真人一进一出gif抽搐免费| av欧美777| 欧美日本视频| 日韩亚洲欧美综合| 久久亚洲精品不卡| 久久精品国产综合久久久| 欧美乱妇无乱码| 久久精品夜夜夜夜夜久久蜜豆| 99久久99久久久精品蜜桃| 给我免费播放毛片高清在线观看| 丁香欧美五月| 波多野结衣巨乳人妻| 日本一二三区视频观看| 久久精品国产自在天天线| 国产亚洲精品综合一区在线观看| 亚洲最大成人手机在线| 精品国产三级普通话版| 国产亚洲精品一区二区www| 国产淫片久久久久久久久 | 午夜福利免费观看在线| 熟女电影av网| 亚洲av不卡在线观看| 国产一区二区三区在线臀色熟女| 国产一级毛片七仙女欲春2| 国产成人啪精品午夜网站| 欧美一区二区亚洲| 人妻夜夜爽99麻豆av| 国产av一区在线观看免费| 搡老妇女老女人老熟妇| 成人国产一区最新在线观看| 男女那种视频在线观看| 久久亚洲真实| 日韩成人在线观看一区二区三区| 丁香六月欧美|